Posted
by
timothy
on Friday November 06, 2015 @06:52PM
from the one-penny-per-quarter dept.

Amanda Parker writes: TalkTalk has announced that 156,959 customers had their personal details accessed as a result of the recent attack on its website, in which 15,656 bank account numbers and sort codes were stolen. In an update, the firm also said the 28,000 credit and debit card numbers that were accessed were obscured, i.e. had part of the number asterixed out, and so are unusable for financial transactions. They were also "orphaned", says TalkTalk, so customers are unable to be verified by the stolen data.

According to someone from the UK, in a previous thread on this subject, TalkTalk is actually large service provider (internet and cellular phone services - as I recal) in the UK with some fairly decent numbers. Though, a quick bit of math in my head indicates this number is only 4,000,000 or slightly less. So, I'm not sure how that relates to the prior comments about the business? Maybe there were only four million customers for this particular service? The prior poster indicated that TalkTalk was 4th in on

One question to ask is, were Talk Talk PCI DSS 3.1 Compliant?Were they using software for change control, and logging of device event logs?

If your storing credit card data, then these standards require you to use software that recomends locking down kit, and logging via event logs to see who's broken in etcAlso to get the certified you need to be audited by an external auditor, have monthly updates, 3 monthly scans, 6 monthly sotware updates etc.I can't help but think with all these break ins, it's just piss poor admin / or cheapness that's at fault

Being an admin myself that's had to lock down kit for PCI DSS standards, these work a little differently

1. First you need to be audited by an external auditor that provides the certificateIf you don't follow the rules then no certification, bribes don't work ether, and most of these guys are really thorough.

2. The network needs to be seperated into DMZ and Protected zones, the credit card data only exists within the Protected zone and there's no direct contact from that zone to the internet, it has to go through a hardware firewall via the DMZ to get to the outside.

3. Typically you install software such as NNT or Tripwire, this monitors every change on the box from dll's being replaced to the smallest change such as Antiirus updates. Filtering and managing this can be a full time job as an admin, usually the software has stuff inbuilt to filter down av updates for example.

4. Next you usually have a set of reports usually built into the same monitoring software that run against all the hardware and check a large number of security settings, most of these can be setup via GPO's some can actually lock it down to the point where the hardware becomes unusable so it can be a comprimise sometimes.

5. Section 10 means that all event logs from all devices need to be captured into a database, this also has a reporting mechanism setup for example if someone tries to brute force the firewall within x minuites or so. minimum storage time is 12 months, also there should be off site backups

6. Every month windows updates need to take place, every 3 months there needs to be scans via software such as Nessus internally, external scans usually via the auditor. Every 6 months a review of the firewall rules, updates to all the software such as cisco firmwares etc.

7. 2 factor authentication is mandatory (yubikey and a password), all access to the kit should also be ip restricted.

8. All code is audited, software devs have to go on training courses, read up on security standards (try googling secure string in C#, or wasp)

The paperwork is horrendous, but it's far from checking boxes, a lot of work has to go into hardening kit for the PCI DSS complaince.Most of the settings you have to change on the kit to harden it usually originate from ether Nessus scans or the complaince reports run from the monitoring software and there's a lot of it.

1. First you need to be audited by an external auditor that provides the certificateIf you don't follow the rules then no certification, bribes don't work ether, and most of these guys are really thorough.

I had the joy of TrustWave auditing systems during a PCI check.

No. "Thorough" is not a word I would use in that situation. They followed a checklist and their involvement began and ended with that checklist.

Every 6 months a review of the firewall rules, updates to all the software such as cisco firmwares e

1. software that monitors every file change on the system, dll's exe's running apps, running services2. software that monitors all event logs and emails you when certain patterns emerge such as brute force attempts3. spending months turning off a gazillion group policy settings, or cisco settings to harden kit4. Nessus is very good at flagging up open ports / (such as Avira's remote management ports for example), or the fact your not using ldaps for your domain